[原文]Multiple SQL injection vulnerabilities in the Web_Links module for PHP-Nuke 7.6 allow remote attackers to execute arbitrary SQL commands via (1) the email or url parameters in the Add function, (2) the url parameter in the modifylinkrequestS function, (3) the orderby or min parameters in the viewlink function, (4) the orderby, min, or show parameters in the search function, or (5) the ratenum parameter in the MostPopular function.

-
漏洞描述

PHP-Nuke contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to multiple variables in the Web_Links Module not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.

-
时间线

公开日期:
2005-04-03

发现日期:
Unknow

利用日期:2005-04-06

解决日期:Unknow

-
解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

-
漏洞作者

-
漏洞信息

漏洞作者:
Discovery of these vulnerabilities is credited to Maksymilian Arciemowicz <max@jestsuper.pl>.

-
受影响的程序版本

Francisco Burzi PHP-Nuke 7.6

-
漏洞讨论

The Web_Links module of PHP-Nuke is affected by multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.

Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

These issues are reported to affect PHP-Nuke version 7.6; earlier versions may also be affected.

-
漏洞利用

No exploit is required.

The following proof of concepts are available:http://www.example.com/[php-nuke]/modules.php?name=Web_Links&amp;l_op=modifylinkrequestS&amp;url='[SQL]http://www.example.com/[php-nuke]/modules.php?name=Web_Links&amp;l_op=viewlink&amp;orderby=[SQL]&amp;min=[SQL]http://www.example.com/[php-nuke]/modules.php?name=Web_Links&amp;l_op=search&amp;query=sex&amp;orderby=[SQL]&amp;min=[SQL]&amp;show=[SQL]http://www.example.com/[php-nuke]/modules.php?name=Web_Links&amp;l_op=MostPopular&amp;ratenum=[SQL]&amp;ratetype=num

-
解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.